July 19, 2016 By Larry Loeb 2 min read

Lucky Green, one of Tor’s earliest participants, has decided to leave the Tor Project.

Lucky’s move may reflect a significant shift at Tor. The project is getting bigger and more diverse, as well as more complicated, and that is resulting in a number of changes across the initiative.

There has been a lot of flux at the Tor Project as of late. The newest director has shaken some trees during her tenure, and members of the board were replaced a few weeks ago. With all the confusion, perhaps Lucky simply decided it was the right time to leave.

Unknown Factors

According to Softpedia, Lucky wrote a message that was then sent to the Tor mailing list.

“Given recent events, it is no longer appropriate for me to materially contribute to the Tor Project either financially, as I have so generously throughout the years, nor by providing computing resources,” he wrote. “I feel that I have no reasonable choice left within the bounds of ethics but to announce the discontinuation of all Tor-related services hosted on every system under my control. Most notably, this includes the Tor node Tonga, the Bridge Authority, which I recognize is rather pivotal to the network.”

He added that Tonga will be shut down for good on Aug. 31, 2016. The delay is to allow Tor developers time to create and implement a substitute. Lucky Green also noted that he will be ending several Tor relays as well, although that should not cause as much disruption.

He gave the project his well wishes and doesn’t seem to be leaving on bad terms, but the move will leave Tor in the lurch.

Tonga Terminated by Lucky Green

Tonga is critical to Tor functionality since the address is hardcoded into the Tor browser. This is done to prevent ISP blocking. It seems Lucky had a secret part of the Tor network hiding in his metaphorical basement.

We may never know why Lucky Green changed his status with the anonymity network. But we do know that Tor must create another bridge authority quickly to avoid further turmoil — and to avoid losing customers who were dependent on Lucky’s tools.

More from

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today